-
1
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proc. of MobiSys, 2003, pp. 31-42.
-
(2003)
Proc. of MobiSys
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
2
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
B. Gedik and L. Liu, "Location privacy in mobile systems: A personalized anonymization model," in Proc. of ICDCS, 2005, pp. 620-629.
-
(2005)
Proc. of ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
3
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The new casper: Query processing for location services without compromising privacy," in Proc. of VLDB, 2006, pp. 763-774.
-
(2006)
Proc. of VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
4
-
-
48649091930
-
-
Hong Kong Baptist University, Tech. Rep
-
J. Xu, J. Du, X. Tang, and H. Hu, "Privacy preserving location based queries in mobile environments," Hong Kong Baptist University, Tech. Rep., 2007.
-
(2007)
Privacy preserving location based queries in mobile environments
-
-
Xu, J.1
Du, J.2
Tang, X.3
Hu, H.4
-
5
-
-
52649118020
-
Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services," in Proc. of ICDE, 2008.
-
(2008)
Proc. of ICDE
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
-
6
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries," TKDE, vol. 19, no. 12, pp. 1719-1733, 2007.
-
(2007)
TKDE
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
7
-
-
35348924316
-
Prive: Anonymous locationbased queries in distributed mobile systems
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Prive: Anonymous locationbased queries in distributed mobile systems," in Proc. of WWW '07, 2007, pp. 371-380.
-
(2007)
Proc. of WWW '07
, pp. 371-380
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
8
-
-
34547474184
-
A peer-to-peer spatial cloaking algorithm for anonymous location-based services
-
C.-Y. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based services," in Proc. of ACM GIS, 2006, pp. 171-178.
-
(2006)
Proc. of ACM GIS
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
11
-
-
36549043405
-
Protecting location privacy with personalized kanonymity: Architecture and algorithms
-
B. Gedik and L. Liu, "Protecting location privacy with personalized kanonymity: Architecture and algorithms," IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1-18, 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
12
-
-
34548396941
-
Preserving user location privacy in mobile data management infrastructures
-
R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, "Preserving user location privacy in mobile data management infrastructures," in Proceedings of 6th Workshop on Privacy Enhancing Technologies, 2006.
-
(2006)
Proceedings of 6th Workshop on Privacy Enhancing Technologies
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
13
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies, "Preserving privacy in environments with location-based applications," Pervasive Computing, vol. 2, no. 1, pp. 56-64, 2003.
-
(2003)
Pervasive Computing
, vol.2
, Issue.1
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
14
-
-
2942524994
-
Location privacy in pervasive computing
-
A. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
17
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: Anonymizers are not necessary," in Proc. of SIGMOD, 2008.
-
(2008)
Proc. of SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
19
-
-
0242332739
-
Small worlds in wireless networks
-
A. Helmy, "Small worlds in wireless networks," IEEE Communications Letters, vol. 7, no. 10, pp. 490-492, 2003.
-
(2003)
IEEE Communications Letters
, vol.7
, Issue.10
, pp. 490-492
-
-
Helmy, A.1
-
20
-
-
51249183803
-
The diameter of random regular graphs
-
B. Bollobs and W. F. de la Vega, "The diameter of random regular graphs," Combinatorica, vol. 2, no. 2, pp. 125-134, 1982.
-
(1982)
Combinatorica
, vol.2
, Issue.2
, pp. 125-134
-
-
Bollobs, B.1
de la Vega, W.F.2
-
24
-
-
0242697123
-
A study of several specific secure two-party computation problems,
-
Ph.D. dissertation
-
W. Du, "A study of several specific secure two-party computation problems," Ph.D. dissertation, 2001.
-
(2001)
-
-
Du, W.1
|